28.04.2014 Views

CPSC 6126 – Information System Assurance

CPSC 6126 – Information System Assurance

CPSC 6126 – Information System Assurance

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

<strong>CPSC</strong> <strong>6126</strong> – <strong>Information</strong> <strong>System</strong> <strong>Assurance</strong><br />

Fall/2011<br />

Instructor<br />

Dr. Jianhua Yang<br />

Center for Commerce and Technology 440<br />

(706) 507–8180<br />

e–mail: yang_jianhua@ColumbusState.edu<br />

website: http://csc.colstate.edu/yang<br />

Office Hours: TBA<br />

Class Meetings<br />

Online Teaching and Learning through WebCT<br />

Course Prerequisites: <strong>CPSC</strong> 5157G or <strong>CPSC</strong> 5157U, or equivalent<br />

Textbook<br />

M. Whitman, H. J. Mattord, “Principles of <strong>Information</strong> Security (4 th edition)”, Course<br />

Technology, Cengage Learning, 2011. ISBN-13:978-1-111-13821-9. ISBN-10: 1-111-<br />

13821-4.<br />

Other Required Materials<br />

1. Internet access to CougarView and Tegrity.<br />

2. “Jing” software to take snapshots for your hands-on labs (or similar software to take<br />

snapshot)<br />

3. A computer at least with the following configuration:<br />

a. Windows 7/XP/Vista operating system<br />

b. 2G memory<br />

c. 40G free space in the hard drive<br />

d. Ethernet network interface card<br />

e. CD-ROM/DVD<br />

Additional textbooks and References<br />

1. M. Goodrich and R. Tamassia, “Introduction to computer security”, 2011,<br />

Addison Wesley.ISBN-13: 978-0-321-51294-9.<br />

2. Charles Pfleeger and Shari Lawrence Pfleeger, Security in Computing (the 4 th<br />

edition).<br />

Course Description<br />

This course focuses on the protection of information systems against unauthorized access<br />

to or modification of information whether in storage, processing or transit, and against<br />

the denial of service to authorized users, including those measures necessary to detect,<br />

document, and counter such threats. This course creates sensitivity to the threats and<br />

vulnerabilities of information systems, recognition of the need and means to protect data


and information, and builds a working knowledge of principles and practices in<br />

information security. Prerequisite: <strong>CPSC</strong> 5157 or equivalent<br />

Course Topics<br />

1. Introduction to information security<br />

2. The need for security<br />

3. Legal, ethical, and professional issues in <strong>Information</strong> Security<br />

4. Risk management<br />

5. Planning for security<br />

6. Firewalls and VPNs<br />

7. Intrusion detection and prevention system, and other security tools<br />

8. Cryptography<br />

9. Physical security<br />

10. Implementing information security<br />

11. Security and personnel<br />

12. <strong>Information</strong> security maintenance<br />

Learning Outcome<br />

1. Students will, upon completion of this course, have a broad understanding and<br />

knowledge skills in computer security and information assurance.<br />

a. Students will have a conceptual understanding and practical experience in<br />

information system assurance;<br />

b. Students will have a strong foundation in virtual machine;<br />

c. Students will have a strong understanding of at least two operating system<br />

and reasonable experience with at least one more operating system;<br />

d. Students will have a conceptual and fundamental understanding of computer<br />

organization, database management, operating system and software<br />

engineering;<br />

e. Students will have a strong foundation in design, analysis and complexity<br />

evaluation of security system;<br />

f. Students will have practical experience in protecting computer system and<br />

preventing attacks.<br />

2. Students will have courses that focus on in depth understanding of selected areas of<br />

computer science.<br />

3. Students will have reasonable experience in the design and implementation of a large<br />

security system.<br />

4. Students will be able to communicate effectively both orally and in written reports.<br />

5. Students will have the knowledge and skills to pursue careers in industry and/or<br />

higher education degree programs.<br />

6. Students will be able to integrate their knowledge and skills into evolving<br />

technologies in computer science.<br />

Learning Objectives<br />

At the completion of this course students will be able to:<br />

1. Understand the major issues of information assurance.<br />

2. Identify threats and vulnerabilities to information systems.


3. Identify data, computer and network exploits.<br />

4. Identify ways to secure data, computers and networks.<br />

5. Understand the use of encryption.<br />

6. Understand the economics of Cybersecurity.<br />

7. Understand the privacy aspects of security.<br />

8. Be aware of the legal and ethical issues of securing information systems.<br />

Course Methods<br />

• Readings. Students will read the textbook and other supplemental materials such as PPT slides and<br />

handouts.<br />

• Assignments. There will be 6 online assignments. Assignments build upon the concepts covered in the<br />

textbook and may involve hands-on work. Assignment submissions are via CougarView only. Email<br />

submission is not accepted. Only the 5 best are considered toward the assignment total. Assignment<br />

deadlines are not flexible for any reason. I understand that sometimes delays are unavoidable; hence,<br />

provision has already been made for the worst grade to be dropped. Late assignments are not accepted<br />

for credit.<br />

• Hands-on labs. There will be 8 hands-on exercises. You must meet the requirements for each hands-on<br />

lab. Download the software needed for each lab, and follow the instructions to finish the lab and<br />

answer the questions at the end of each lab. If snapshots are needed, please take the required snapshots<br />

when you conduct the hands-on lab and submit them through your lab report. Each hands-on lab report<br />

has a deadline set up. The deadlines are not flexible for any reason. Email submission is not<br />

accepted. Most software for the labs are available at the Internet. You can also download them from<br />

“My Download Center” at CougarView.<br />

• Exams. There will be 12 online tests, one final exam hosted at CougarView as shown in the course<br />

schedule. Students need to finish the tests and final exam online. You have two tries for each online<br />

tests, one try for the final exam. All the tests and exam will be open textbook with time limit, so that a<br />

proctor will not be required. The deadline for each online test and final exam is strictly enforced.<br />

Nobody can make up the tests and final exam if you miss the deadline without reasonable reason. “My<br />

computer is crashed, or I do not have Internet access, or my system got stuck, or the CougarView is not<br />

accessible, or I did the test but forgot to submit, or during doing the test, my system is crashed” are not<br />

the excuses to make up the test.<br />

• You Must Know. This course will cover some techniques for attacking purpose. Nobody can use the<br />

techniques to attack or crash other systems. You must be responsible for your activities.<br />

Student Responsibilities<br />

1. Managing your time and maintaining the discipline required to meet course<br />

requirements.<br />

2. Covering all assigned readings in a timely manner.<br />

3. Completing all assignments, hands-on labs, online tests and final exam.<br />

4. Chapter assignments and hands-on lab reports:<br />

o All assignments and reports must be typed not hand-written and must be<br />

submitted in one word/pdf format file. Each assignment or lab report must<br />

be named in the following format:<br />

1) LastName_FirstName_Assignment xx<br />

2) LastName_FirstName_Report_Lab xx<br />

o Assignments and hands-on labs are due exactly at the prescribed time. No<br />

late submission is accepted.<br />

o Submit the softcopy of the assignments through your CougarView account.


o Any questions or complaints regarding the grading of an assignment or<br />

test or hands-on lab reports must be raised within one week after the score<br />

or the graded assignment is made available.<br />

5. Providing answers for any examination when not specifically authorized by the<br />

instructor to do so, or, informing any person or persons of the contents of any<br />

examination prior to the time the examination is given is considered cheating.<br />

6. Penalty for cheating will be extremely severe. Use your best judgment. If you are<br />

not sure about certain activities, consult the instructor. Standard academic<br />

honesty procedure will be followed for cheating and active cheating<br />

automatically results F in the final grade. Please<br />

http://aa.colstate.edu/advising/a.htm#Academic Dishonesty/Academic<br />

Misconduct for additional information.<br />

7. Pay very careful attention to your email correspondence. It reflects your<br />

communication skills. Avoid use non-standard English such as "how r u" in your<br />

email message. In addition, I recommend you put the class number <strong>CPSC</strong> <strong>6126</strong><br />

and a brief summary of your question in your email subject. For example,<br />

Subject: <strong>CPSC</strong> <strong>6126</strong> A question on using Virtual Box.<br />

Instructor Responsibilities<br />

1. Give lectures (CougarView and Tegrity) and demonstration on the course material.<br />

2. Assign appropriate homework that illustrates the concepts of the course, and<br />

grade and return the homework in a timely manner with adequate explanation.<br />

3. Give tests over the material and grade and return the tests in a timely manner<br />

4. Maintain a website that supports the course.<br />

5. Reply promptly (within one business day) to all student e–mail communications.<br />

Methods for Evaluating Students<br />

The evaluation methods include assignments, online tests, hands-on labs, and a final<br />

exam.<br />

Chapter assignments 20%<br />

Online tests 20%<br />

Hands-on labs 30%<br />

Final exam 30%<br />

The Exams: All the tests and final exam are given online and open-book.<br />

Assignment of Letter Grades<br />

The method of assigning letter grades based on overall course averages is fairly standard.<br />

The basic method for assigning grades is described as follows:<br />

Average Letter Grade<br />

90 – 100 A<br />

80 – 89 B<br />

70 – 79 C<br />

60 – 69 D<br />

Below 60 F


Tentative Topic Schedule<br />

Week Topics Assignments Handson<br />

labs<br />

1 (Aug.15-21) Introduction to how to learn<br />

this course (see the Video at<br />

Tegrity)<br />

Online<br />

Tests<br />

2 (Aug.22-28) Ch1: Introduction to<br />

<strong>Information</strong> Security<br />

3 (Aug. 29-04) Ch2: The need for Security Lab 1 Test 1<br />

4 (Sep. 06-11) Ch3: Legal, Ethical and Assignment1 Test 2<br />

Professional Issues in<br />

<strong>Information</strong> Security<br />

5 (Sep.12-18) Ch4: Risk Management Test 3<br />

6 (Sep.19-25) Ch5: Planning for Security Assignment 2 Lab 2 Test 4<br />

7 (Sep.26-02) Ch6: Security Technology:<br />

Firewall and VPNs<br />

8 (Oct.03-09) Ch7: Intrusion Detection and<br />

Prevention<br />

Oct.10-11 Fall beak<br />

9 (Oct.12-16) Ch7: Other Security Tools Assignment 3<br />

Test 5<br />

Lab 3 Test 6<br />

10 (Oct.17-23) Ch8: Cryptography Lab 4 Test 7<br />

11 (Oct.24-30) Ch9: Physical Security Assignment 4 Lab 5 Test 8<br />

12 (Oct.31-06) Ch10: Implementing<br />

Lab 6 Test 9<br />

<strong>Information</strong> Security<br />

13 (Nov.7-13) Ch11: Security and Personnel Assignment 5 Test 10<br />

14(Nov.14-20)<br />

15(Nov.21-27)<br />

Ch12: <strong>Information</strong> Security<br />

Maintenance<br />

Thanksgiving Holiday break<br />

Lab 7 Test 11<br />

16(Nov.28-05) Assignment 6 Lab 8 Test 12<br />

Dec. 06<br />

Final Exam<br />

Course Assistance<br />

The best way to get in touch with me is by CougarView e–mail.<br />

Dropping the Course<br />

We hope that you will complete the course and profit from it. If it is necessary for you to<br />

withdraw from the course during the semester, you must follow all official CSU<br />

procedures for withdrawing. It is not sufficient to notify the instructor; you must use the<br />

ISIS system and withdraw officially. For details on how to withdraw from a course, see<br />

the web page<br />

http://aa.colstate.edu/advising/w.htm#Withdrawal%20from%20a%20Course.


I would appreciate it if you were first to consult with me before starting the procedure for<br />

withdrawing from the course. In some cases, we can agree on an arrangement that will<br />

allow you to complete the course with minor adjustments.<br />

Academic Honesty<br />

Academic dishonesty includes, but is not limited to, activities such as cheating and<br />

plagiarism (http://aa.colstate.edu/advising/a.htm#Academic Dishonesty/Academic<br />

Misconduct). It is a basis for disciplinary action. Any work turned in for individual credit<br />

must be entirely the work of the student submitting the work. All work must be your own.<br />

You may share ideas but submitting identical assignments (for example) will be<br />

considered cheating. You may discuss the material in the course and help one another<br />

with debugging; however, any work you hand in for a grade must be your own. A simple<br />

way to avoid inadvertent plagiarism is to talk about the assignments, but don't read each<br />

other's work or write solutions together unless otherwise directed. For your own<br />

protection, keep scratch paper and old versions of assignments to establish ownership,<br />

until after the assignment has been graded and returned to you. If you have any questions<br />

about this, please see me immediately. For assignments, access to notes, the course<br />

textbooks, books and other publications is allowed. All work that is not your own,<br />

MUST be properly cited. This includes any material found on the Internet. Stealing or<br />

giving or receiving any code, diagrams, drawings, text or designs from another person<br />

(CSU or non-CSU, including the Internet) is not allowed. Having access to another<br />

person's work on the computer system or giving access to your work to another person is<br />

not allowed. It is your responsibility to keep your work confidential.<br />

No cheating in any form will be tolerated. Penalties for academic dishonesty may include<br />

a zero grade on the assignment or exam/quiz, a failing grade for the course, suspension<br />

from the Computer Science program, and dismissal from the program. All instances of<br />

cheating will be documented in writing with a copy placed in the Department's files.<br />

Students will be expected to discuss the academic misconduct with the faculty member<br />

and the chairperson. For more details see the Faculty Handbook:<br />

http://aa.colstate.edu/faculty/FacHandbook0203/sec100.htm#109.14 and the Student<br />

Handbook: http://sa.colstate.edu/handbook/handbook2003.pdf<br />

ADA Accommodation Notice<br />

If you have a documented disability as described by the Rehabilitation Act of 1973<br />

(P.L. 933-112 Section 504) and the Americans with Disability Act (ADA) that may<br />

require you to need assistance attaining accessibility to instructional content to meet<br />

course requirements, we recommend that you contact the Center for Academic Support in<br />

Tucker Hall, room 100 or at (706)568-2330, as soon as possible. It is then your<br />

responsibility to contact and meet with the instructor. It is also your responsibility<br />

to present the instructor with a letter from the Center for Academic Support.<br />

Without this letter detailing the required accommodations, the instructor cannot<br />

help you. The Center for Academic Support can assist you and the instructor in<br />

formulating a reasonable accommodation plan and provide support in developing<br />

appropriate accommodations for your disability. Course requirements will not be waived<br />

but accommodations may be made to assist you to meet the requirements. Technical<br />

support may also be available to meet your specific need. For more information on<br />

services and support available, refer to http://uc.colstate.edu/disability_services.htm.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!